It has been more than 10 years now for me in the networking domain and my work experience mostly involves with SP network in the past. Still curious to learn more and feeling a lot to do :-).
It is CCIE SP my target in the future, towards which I am willing to march and achieve in due course of time.
I prefer to start the day with netpro by which you will get the chance to upgrade/update yourself in all techie stuffs and ofcourse I have been doing this for more than 6 years now.
Started as rookie posting more n more queries then started giving my replies based on my experience in the working environment.
My only probs at present is I feel I could not actively participate in the netpro discussions due to the time (factor) difference :-).
As always mentioned/pointed out by other netpros I would suggest the active users to rate or reply back once their problem is solved.
So that it can help other users to save sometime in posting/repeating the same problem out here and waiting for the reply from other netpros.In the meantime he can do a search out here and follow the procedures mentioned on the solved post .

It has been more than 10 years now for me in the networking domain and my work experience mostly involves with SP network in the past. Still curious to learn more and feeling a lot to do :-).
It is CCIE SP my target in the future, towards which I am willing to march and achieve in due course of time.
I prefer to start the day with netpro by which you will get [Show more]

Assuming that permissions are set to allow it, if <filename> already exists in the directory of the tftp server and if you execute the command to copy then the old file will be overwritten by the new file.
HTH
Rick
... View more

A virtual private network (VPN) helps organizations securely and cost-effectively extend connectivity and improve speed. A VPN (virtual private network) is a private network constructed within a public network infrastructure, such as the global Internet. These protect data traversing the VPN from unauthorized access.
... View more

I've also found before when receiving the error below that also in the log is the a message about LACP not being enabled on the remote port. In this case please check to see if using channel-group X mode desirable or channel-group X mode on would fix your issue! I know the original issue has been solved, but posting this for others who may be receiving the same error.
extende: %EC-SP-5-CANNOT_BUNDLE2: Gi2/6 is not compatible with Po5 and will be suspended (vlan mask is different)
... View more

Hello
@jagadishbabu_thota wrote:
My question is not about the Administrative distance of Static Routing, but about the default Administrative Distance of Default Routing where the destinations are unknown.
One thing that hasn't been mentioned here is if the default route from lets say ISDN PPOE/A interface, Which is usually assigned dynamically to a routers dialer interface. As such without any static route being added, This default route or gateway of last resort will have an metric of 254 and not 1.
Hence why in such cases it preferable to add default static route manually which will then have a admin distance of 1
... View more

There are three types of DDoS attacks. Below is a good table that summarizes them:
Volumetric Attacks
Protocol Attacks
Application Attacks
What is it?
Attacks that use massive amount of traffic saturating the bandwidth of the target. Volumetric attacks are easy to generate by employing simple amplification techniques.
Attacks that render a target in-accessible by exploiting a weakness in the Layer 3 and Layer 4 protocol stack.
Attacks that exploit a weakness in the Layer 7 protocol stack. The most sophisticated of attacks and most challenging to identify/mitigate.
How does it cripple the target?
The sheer quantity of traffic generated by the attack can completely block access to the end-resource (a website or a service). The magnitude of the attack is commonly measured in bits or packets per second.
Protocol attacks consume all the processing capacity of the attacked-target or intermediate critical resources like a firewall causing service disruption.
Application attacks establish a connection with the target and then exhaust the server resources by monopolizing processes and transactions.
Examples
NTP Amplification, DNS Amplification, UDP Flood, TCP Flood
Syn Flood, Ping of Death
HTTP Flood, Attack on DNS Services
To combat DDoS attacks, Cisco has partnered with Radware. The Radware solution can be deployed:
1. As a Decorator on the Firepower 4100s and 9300s appliances
2. Standalone appliance
3. Cloud and hybrid based
Take a look at the following links for more information:
https://www.youtube.com/watch?v=aOLM9md2eMQ
!
https://www.radware.com/partners/technologypartners/cisco-firepower-ngfw/
I hope this helps!
Thank you for rating helpful posts!
... View more

A routing protocol specifies how routers communicate with each other, distributing information that enables them to select routes between any two nodes on a computer network. Routing algorithms determine the specific choice of route. Each router has a prior knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbors, and then throughout the network. This way, routers gain knowledge of the topology of the network. The specific characteristics of routing protocols include the manner in which they avoid routing loops, the manner in which they select preferred routes, using information about hop costs, the time they require to reach routing convergence, their scalability, and other factors. Although there are many types of routing protocols, three major classes are in widespread use on IP networks: Interior gateway protocols type 1, link-state routing protocols, such as OSPF and IS-IS Interior gateway protocols type 2, distance-vector routing protocols, such as Routing Information Protocol, RIPv2, IGRP. Exterior gateway protocols are routing protocols used on the Internet for exchanging routing information between Autonomous Systems, such as Border Gateway Protocol (BGP), Path Vector Routing Protocol. Exterior gateway protocols should not be confused with Exterior Gateway Protocol (EGP), an obsolete routing protocol. Routing protocols, according to the OSI routing framework, are layer management protocols for the network layer, regardless of their transport mechanism: IS-IS runs on the data link layer (Layer 2) Open Shortest Path First (OSPF) is encapsulated in IP, but runs only on the IPv4 subnet, while the IPv6 version runs on the link using only link-local addressing. IGRP, and EIGRP are directly encapsulated in IP. EIGRP uses its own reliable transmission mechanism, while IGRP assumed an unreliable transport. Routing Information Protocol (RIP) runs over the User Datagram Protocol (UDP). Version 1 operates in broadcast mode, while version 2 uses multicast addressing. BGP runs over the Transmission Control Protocol (TCP)
... View more